The Second ACM Workshop on Scalable Trusted Computing (STC 07) 

Call for Papers 

In a society increasingly dependent on networked information systems,
trusted computing plays a crucial role. Despite significant progress
in trusted computing components, the issue of scalability in trusted
computing and its impact on security are not
well-understood. Consequently, there is a dearth of practical
solutions for trusted computing in large-scale systems. Approaches
suitable for small- or medium-scale trusted computing systems might
not be applicable to larger-scale scenarios.

This workshop, built on the success of its predecessor (STC'06), is
focused on trusted computing in large-scale systems -- those involving
(at the very least) many millions of users and thousands of third
parties with varying degrees of trust. The workshop is intended to
serve as a forum for researchers as well as practitioners to
disseminate and discuss recent advances and emerging issues.

The workshop solicits two types of original papers that are single
-column using at least 11pt fonts. The length of the full-paper
submissions is at most 12 pages excluding bibliography, appendix
etc. The total number of pages should not be more than 20, whereas the
reviewers are not required to read the appendix. The length of
short/work-in-progress/position-paper submissions is at most 6 pages
excluding bibliography. A paper submitted to this workshop must not be
in parallel submission to any other journal, magazine, conference or
workshop with proceedings. It is up to the authors to decide whether a
submission should be anonymous (i.e., no author names, affiliation
information appeared in the submission). It is noted that the
proceedings versions of the accepted papers will likely be up to 10
pages for full papers and up to 4 pages for
short/work-in-progress/position-paper in ACM format. The workshop
proceedings will be published by the ACM Press and appear in ACM
Digital Library.

Topics of interest to the workshop include the following: 
models for trusted computing 
principles of trusted computing 
modeling of computing environments, threats, attacks and countermeasures 
limitations, alternatives and tradeoffs regarding trusted computing
 trust in authentications, users and computing services 
hardware based trusted computing
 software based trusted computing
 pros and cons of hardware based approach
 remote attestation of trusted devices
 censorship-freeness in trusted computing
 cryptographic support in trusted computing
 case study in trusted computing
 applications of trusted computing
 intrusion resilience in trusted computing
 access control for trusted computing
 trust of computing systems
 principles for handling scales
 scalable trust support and service
 trusted embedded computing and systems
 trusted computing in networks and distributed systems
 virtualization and trusted computing 

Important dates: 
Submission due: June 20, 2007 
Notification: Aug. 10, 2007 
Proceedings version due: Aug. 22, 2007 
CCS conference: Oct. 29 - Nov. 2, 2007
STC workshop: Nov. 2, 2007

Submission information: TBA 

PC co-chairs: Shouhuai Xu University of Texas, San Antonio 
Moti Yung RSA and Columbia University 

Program Committee: 
Yongdae Kim, University of Minesota
Klaus Kursawe,  Philips Research
Wenbo Mao, EMC Labs
Cristina Nita-Rotaru, Purdue University
Joon Park, Syracuse University
Luigi Romano, University of Naples
Ahmad-Reza Sadeghi, Ruhr-University Bochum 
Jean-Pierre Seifert, University of Haifa 
Sean Smith, Dartmouth College
Leendert van Doorn, AMD
Haifeng Yu, National University of Singapore
Xiaolan Zhang, IBM Research 
Xinwen Zhang, Samsung Research